{"id":2935,"date":"2017-04-11T10:29:45","date_gmt":"2017-04-11T08:29:45","guid":{"rendered":"http:\/\/securite.intrinsec.com\/?p=2935"},"modified":"2017-04-11T10:29:45","modified_gmt":"2017-04-11T08:29:45","slug":"insomnihack-2017-2","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/insomnihack-2017-2\/","title":{"rendered":"INSOMNI&#039;HACK 2017"},"content":{"rendered":"<p>This year again, Intrinsec was present this past Friday, March 24th, for the 10th edition of the Insomni&#039;hack conference organized by SCRT.<\/p>\n<p>Several presentations were held in 3 different rooms and the corresponding schedule was as follows:<img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-2888\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2017\/04\/2017-04-03_15-04-57.png\" alt=\"\" width=\"910\" height=\"905\" \/><\/p>\n<h1>Bridging the gap between ICS (IoT?) and corporate IT security<\/h1>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-2893\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2017\/04\/Stefan-L%C3%BCders.jpg\" alt=\"\" width=\"1042\" height=\"460\" \/><br \/>\nStefan L\u00fcders, CISO of the European Organization for Nuclear Research (CERN), presented us with these problems encountered in defending the CERN ecosystem.<\/p>\n<p>In such a heterogeneous system, the BYOD issue becomes particularly relevant. Beyond the complexity of implementing update patches, conducting security tests is even more challenging on sensitive systems like those monitoring nuclear reactors, where any disruption is unacceptable.<\/p>\n<p>While we wait for the official video, an earlier version of this presentation is available here:<br \/>\n<a href=\"https:\/\/www.blackhat.com\/docs\/us-14\/materials\/us-14-Luders-Why-Control-System-Cyber-Security-Sucks.pdf\">https:\/\/www.blackhat.com\/docs\/us-14\/materials\/us-14-Luders-Why-Control-System-Cyber-Security-Sucks.pdf<\/a><\/p>\n<h1>DevOops Redux<\/h1>\n<p>This conference was presented by Ken Johnson (<a href=\"https:\/\/twitter.com\/cktricky\">@cktricky<\/a>) and Chris Gates (<a href=\"https:\/\/twitter.com\/Carnal0wnage\">@Carnal0wnage<\/a>), focused on the importance of security for developers&#039; machines and the various tools that are often poorly understood. According to Ken, a development machine is generally a goldmine for an attacker since it contains API keys, passwords for accessing sensitive services, and possibly SSH keys for authentication to pre-production or production servers.<\/p>\n<p>The primary goal of this presentation was to raise awareness among the audience about three areas: developer awareness, protection of development servers, and deployment management services. Chris and Ken therefore presented several tools, such as <a href=\"https:\/\/github.com\/maus-\/slack-auditor\">Slack auditor<\/a>, <a href=\"https:\/\/github.com\/michenriksen\/gitrob\">gitrob<\/a>, <a href=\"https:\/\/github.com\/dxa4481\/truffleHog\">TruffleHog <\/a>or <a href=\"https:\/\/gitmonitor.com\">GitMonitor<\/a>, allowing the exploitation of the human factor (forgetting configuration files) and the recovery of this type of sensitive information.<br \/>\nRegarding the protection of development servers, various tools were mentioned, such as\u2019<a href=\"https:\/\/osquery.io\">Osquery<\/a>\u00a0allowing you to query its operating system, <a href=\"https:\/\/github.com\/mwielgoszewski\/doorman\">Doorman <\/a>or <a href=\"https:\/\/objective-see.com\/products\/blockblock.html\">BlockBlock<\/a>, configured to warn when software wants to persist on the system and request confirmation from the user. SIEM-type solutions were then presented: ELK, <a href=\"https:\/\/github.com\/airbnb\/streamalert\">StreamAlert <\/a>or Splunk.<\/p>\n<p>Finally, for the last part of the presentation, Ken and Chris focused on the tools used by the integration chain, presenting configuration flaws often encountered with Jenkins, Redis, Docker or AWS services.<\/p>\n<p>The presentation slides are available on SlideShare at the following address:<br \/>\n<a href=\"https:\/\/www.slideshare.net\/chrisgates\/devoops-attacks-and-defenses-for-devops-toolchains\">https:\/\/www.slideshare.net\/chrisgates\/devoops-attacks-and-defenses-for-devops-toolchains<\/a><\/p>\n<h1>Modern recognition phase on APT \u2013 protection layer<\/h1>\n<p>Paul Rascagn\u00e8res presented five case studies of the reconnaissance phase carried out by &quot;modern&quot; attackers before infecting the target. In all cases, the attack vector was an Office document containing a malicious macro. Analysis of the various techniques used by the attackers revealed a generic process broken down into four steps:<\/p>\n<ul>\n<li><strong>Step 1:<\/strong> Execution of the first load (here the Office document macro) which performs a scan of the execution environment<\/li>\n<li><strong>Step 2:<\/strong> Sending the analysis results to the attacker<\/li>\n<li><strong>Step 3:<\/strong> Validation of the environment by the attacker; he ensures that the execution does not take place in a sandbox-type analysis environment, based on the information received.<\/li>\n<li><strong>Step 4:<\/strong> Deposit of the final payload (RAT, c&amp;c agent, etc.), if the environment meets the attacker&#039;s expectations.<\/li>\n<\/ul>\n<p>This study highlights the importance that attackers place on their compromise and exploitation tools.<\/p>\n<p>Finally, a question was asked at the end of the presentation:<br \/>\n\u00ab&quot;What if we tricked all programs into thinking they were running in a sandbox?&quot;\u00bb<br \/>\nPaul replied that in all the cases studied, the attacker would not have sent his final payload.<\/p>\n<h1>A new Source of trouble \u2013 Remote exploitation of the Valve Source game engine<\/h1>\n<p>Amat Cama focused his study on the game engines used by the publisher Valve.<\/p>\n<p>He then described what are known as &quot;Game engines,&quot; which provide access to the APIs used by video games. These offer several generic functionalities that accelerate video game development.<\/p>\n<p>Amat therefore decided to target the Valve game engine since it is one of the most used and therefore allows impacting as many &quot;games&quot; as possible.<\/p>\n<p>During his demonstration, he created a malicious server to exploit a vulnerability allowing control of the machines of players connected to it.<\/p>\n<h1><\/h1>\n<h1>CTF<\/h1>\n<p>This year, over 450 people competed in this memorable CTF. In addition to the usual forensics, system, and web exploitation challenges, a special challenge was developed using Unity in the form of a 3D FPS (First-Person Shooter) game. To succeed, players had to cheat to access certain areas of the game and thus capture the flags.<\/p>\n<p>Another new feature of this edition was the &quot;Escape Room&quot; challenge, in which participants had to assemble a QR code puzzle, pick padlocks, and log into a computer using a barcode scanner, all as quickly as possible. Intrinsec finished in first place in this challenge, completing it in 5 minutes and 6 seconds.<\/p>\n<p>And once again it is &quot;Dragon Sector&quot; that takes first place with a total of 97400 points by completing a challenge at the very last minute.<\/p>\n<p>All write-ups can be viewed via the following link:<br \/>\n<a href=\"https:\/\/ctftime.org\/event\/383\/tasks\/\">https:\/\/ctftime.org\/event\/383\/tasks\/<\/a><\/p>\n<p>We would like to thank SCRT for organizing this event and for their hospitality.<\/p>","protected":false},"excerpt":{"rendered":"<p>This year again, Intrinsec was present last Friday, March 24th, for the 10th edition [\u2026]<\/p>","protected":false},"author":1,"featured_media":2887,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,19,22],"tags":[],"class_list":["post-2935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evaluation-securite","category-soc-securite-operationnelle","category-veille-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>INSOMNI\u2019HACK 2017 - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/insomnihack-2017-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"INSOMNI\u2019HACK 2017\" \/>\n<meta property=\"og:description\" content=\"Cette ann\u00e9e encore, Intrinsec \u00e9tait pr\u00e9sent ce vendredi 24 mars dernier, pour la 10\u00e8me \u00e9dition [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/insomnihack-2017-2\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-11T08:29:45+00:00\" \/>\n<meta name=\"author\" content=\"Intrinsec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Intrinsec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/\"},\"author\":{\"name\":\"Intrinsec\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"headline\":\"INSOMNI\u2019HACK 2017\",\"datePublished\":\"2017-04-11T08:29:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/\"},\"wordCount\":1061,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Evaluation S\u00e9curit\u00e9\",\"SOC S\u00e9curit\u00e9 Op\u00e9rationnelle\",\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/\",\"name\":\"INSOMNI\u2019HACK 2017 - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-04-11T08:29:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/insomnihack-2017-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"INSOMNI\u2019HACK 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\",\"name\":\"Intrinsec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"caption\":\"Intrinsec\"},\"sameAs\":[\"https:\\\/\\\/www.intrinsec.com\"],\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/ufhtbqccsz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"INSOMNI&#039;HACK 2017 - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/insomnihack-2017-2\/","og_locale":"en_US","og_type":"article","og_title":"INSOMNI\u2019HACK 2017","og_description":"Cette ann\u00e9e encore, Intrinsec \u00e9tait pr\u00e9sent ce vendredi 24 mars dernier, pour la 10\u00e8me \u00e9dition [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/insomnihack-2017-2\/","og_site_name":"INTRINSEC","article_published_time":"2017-04-11T08:29:45+00:00","author":"Intrinsec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Intrinsec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/"},"author":{"name":"Intrinsec","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"headline":"INSOMNI\u2019HACK 2017","datePublished":"2017-04-11T08:29:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/"},"wordCount":1061,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#primaryimage"},"thumbnailUrl":"","articleSection":["Evaluation S\u00e9curit\u00e9","SOC S\u00e9curit\u00e9 Op\u00e9rationnelle","Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/","url":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/","name":"INSOMNI&#039;HACK 2017 - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-04-11T08:29:45+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/insomnihack-2017-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/insomnihack-2017-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"INSOMNI\u2019HACK 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799","name":"Intrinsic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","caption":"Intrinsec"},"sameAs":["https:\/\/www.intrinsec.com"],"url":"https:\/\/www.intrinsec.com\/en\/author\/ufhtbqccsz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/2935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=2935"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/2935\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=2935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=2935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=2935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}